Learn Osint: Open-Source Intelligence

Posted By: ELK1nG

Learn Osint: Open-Source Intelligence
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.04 GB | Duration: 5h 6m

Become a cyber detective - This course prepares you to uncover hidden online information with Open Source Intelligence!

What you'll learn

Gather publicly available data to perform investigations

Analyze, and interpret data in investigations

Stay anonymous while browsing the web

Create, and use sock puppets to obtain information

Enhance and optimize the process of using search engines

Search people by their phone numbers, email addresses, names, and usernames

Search businesses and related information

Analyze and trace images

Investigate locations without the need to go there in person

Analyze blockchain transactions

Requirements

A device with an internet connection. Ideally a laptop and a smartphone with at least 40gb free on the hard drive.

A basic understanding of technology

Description

Master the art of Open Source Intelligence and unlock the secrets hidden across the internet. This course takes you from a beginner to an advanced OSINT practitioner with a straightforward, expert-guided approach.You’ll learn how to safely and effectively gather intelligence from publicly available sources, utilizing the same techniques used by investigators, cybersecurity professionals, and journalists. This course covers all essential aspects of OSINT, from the ethical considerations of information gathering to advanced search techniques and beyond.Explore a wide range of tools and techniques for uncovering information about individuals, companies, and even physical locations. You'll master the use of search engines, social media analysis, email tracing, and image verification, all while maintaining your anonymity and protecting your data.Learn how to set up secure environments using virtual machines, VPNs, and specialized operating systems like CSI Linux. Delve into the world of sock puppets, creating and managing fake identities to gather intelligence undetected. You’ll also explore the dark web, understand the importance of encryption, and discover how to remove your own data from the internet.By the end of this course, you’ll have a practical, hands-on skill set that will make you proficient in the art of OSINT. Whether you're aiming to enhance your career or satisfy your curiosity, this course is your gateway to mastering the world of online intelligence gathering.

Overview

Section 1: Introduction

Lecture 1 Introduction To OSINT

Lecture 2 Course Breakdown

Lecture 3 Osint Methodology

Section 2: Safety Measures

Lecture 4 Do We Need a VM ?

Lecture 5 VM Setup

Lecture 6 M1/M2/M3 Macbook Installation

Lecture 7 VPNs

Lecture 8 Browser Setup

Lecture 9 Handling Data In Investigation

Lecture 10 Section 2 Notes

Section 3: Documenting

Lecture 11 Advices & Tips On Documenting & Taking Notes

Section 4: Sock Puppets

Lecture 12 What Are They ?

Lecture 13 The Approach

Lecture 14 Setting Up Sock Puppets

Lecture 15 Advanced Techniques & Psyops

Lecture 16 Section 4 Notes

Section 5: Search Engines

Lecture 17 Google Search Operators

Lecture 18 Bing & DuckDuckGo Search Operators

Lecture 19 Yandex & Baidu Search Operators

Lecture 20 Section 5 Notes

Section 6: Searching People

Lecture 21 OSINT Tools List

Lecture 22 Searching Accounts

Lecture 23 Searching People Part 1

Lecture 24 Searching People Part 2

Lecture 25 Voter Records

Lecture 26 Searching Phone Numbers Part 1

Lecture 27 Searching Phone Numbers Part 2

Lecture 28 Performing Background Checks

Lecture 29 Section 6 Notes

Section 7: Searching Businesses

Lecture 30 Searching Companies Part 1

Lecture 31 Searching Company Part 2

Lecture 32 Section 7 Notes

Section 8: Resume Hunting

Lecture 33 Searching Resumes

Section 9: Email Search

Lecture 34 Enumerating and Verifying Email Addresses

Lecture 35 Email Associated Accounts

Lecture 36 Leads and Verifying

Lecture 37 Password Hunting

Lecture 38 Section 9 Notes

Section 10: Images

Lecture 39 Retrieving, Viewing & Handling EXIF Data

Lecture 40 Reverse Image Lookup

Lecture 41 Facial Recognition

Lecture 42 Section 10 Notes

Section 11: Social Media

Lecture 43 Twitter (X)

Lecture 44 Discord

Lecture 45 Instagram

Lecture 46 Facebook

Lecture 47 TikTok

Lecture 48 Others

Section 12: Legacy

Lecture 49 Legacy Lookup

Lecture 50 Section 12 Notes

Section 13: Physical OSINT

Lecture 51 Introduction

Lecture 52 Google Maps

Lecture 53 Bing

Lecture 54 Section 13 Notes

Section 14: Extras

Lecture 55 Requesting Data Removals

Lecture 56 Google Alerts

Lecture 57 Deep/Dark Web

Lecture 58 Accessing Dark Web With Tor

Lecture 59 Crypto OSINT

Lecture 60 Section 14 Notes

Beginner to advanced OSINT investigators,Cyber and information security professionals,Journalists,Business intelligence